CVE-2016-1576
Summary
| CVE | CVE-2016-1576 |
|---|---|
| State | PUBLISHED |
| Assigner | canonical |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-05-02 10:59:24 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program. |
Risk And Classification
Primary CVSS: v3.1 7.8 HIGH from [email protected]
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Problem Types: NVD-CWE-noinfo | n/a
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.8 | HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 2.0 | [email protected] | Primary | 7.2 | AV:L/AC:L/Au:N/C:C/I:C/A:C |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Canonical | Ubuntu Core | 15.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 12.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 14.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 15.10 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 16.04 | All | All | All |
| Operating System | Canonical | Ubuntu Linux | 16.10 | All | All | All |
| Operating System | Canonical | Ubuntu Touch | 15.04 | All | All | All |
| Operating System | Linux | Linux Kernel | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| oss-security - Re: CVE-2021-3847: OverlayFS - Potential Privilege Escalation using overlays copy_up | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Mailing List, Third Party Advisory |
| oss-security - Overlayfs over Fuse Privilege Escalation in USERNS | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | Mailing List, Third Party Advisory |
| launchpadlibrarian.net/235300093/0005-overlayfs-Be-more-careful-about-copying-up-sxi... | af854a3a-2127-422b-91ae-364da2661108 | launchpadlibrarian.net | Mailing List, Patch, Third Party Advisory |
| Overlayfs Over Fuse Local Root Privilege Escalation | af854a3a-2127-422b-91ae-364da2661108 | www.halfdog.net | Exploit, Third Party Advisory |
| launchpadlibrarian.net/235300225/0006-overlayfs-Propogate-nosuid-from-lower-and-uppe... | af854a3a-2127-422b-91ae-364da2661108 | launchpadlibrarian.net | Mailing List, Patch, Third Party Advisory |
| CVE-2016-1576 in Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | people.canonical.com | Third Party Advisory |
| Bug #1535150 “CVE-2016-1576” : Bugs : linux package : Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | bugs.launchpad.net | Third Party Advisory |
| kernel/git/torvalds/linux.git - Linux kernel source tree | af854a3a-2127-422b-91ae-364da2661108 | git.kernel.org | Mailing List, Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.